2019 11th International Conference on Measuring Technology and Mechatronics Automation (ICMTMA)
Download PDF

Abstract

Edge computing real-time processing of requests for massive amounts of terminal equipment brought a feasible solution, but the edge of the distributed calculation, real time characteristics as well as information security protection has brought more limited, identity authentication and privacy for edge computing applications and data security protection needs to face the challenge of problem, this paper expounds the current edge computing terminal security access to the information security requirements, analyzes the possible means of the information security threats, put forward a kind of edge computing scenarios "cloud - edge - end" three-tier system of heterogeneous terminal access authentication mechanism, solutions to support access to huge amounts of terminal authentication request, And through the anonymous identity to protect the privacy of the terminal equipment.
Like what you’re reading?
Already a member?
Get this article FREE with a new membership!

Related Articles